Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Authentication method for network slice and corresponding device, system and medium

A network slicing and network authentication technology, applied in the field of systems and media, network slicing authentication methods and corresponding devices, can solve problems such as the inability to meet UE access network slicing authentication requirements, and achieve the effect of satisfying dynamic deployment characteristics

Inactive Publication Date: 2018-12-28
ZTE CORP
View PDF6 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Due to the dynamic deployment characteristics of network slices, AKA authentication in the attach process cannot meet the authentication requirements for UE access to network slices

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentication method for network slice and corresponding device, system and medium
  • Authentication method for network slice and corresponding device, system and medium
  • Authentication method for network slice and corresponding device, system and medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0037] Such as figure 1 As shown, an embodiment of the present invention provides an authentication method for network slicing, the method comprising:

[0038] S101, acquiring a network slice authentication vector corresponding to user network slice identity information SID (Slice Identification) of the user terminal UE from a network authentication entity;

[0039] S102. Perform authentication with the user terminal according to the network slice authentication vector.

[0040] The network authentication entity may be a home subscriber server (Home Subscriber Server, HSS).

[0041] The method in the embodiment of the present invention is used for a network slicing functional entity.

[0042] In the embodiment of the present invention, the network slice authentication vector corresponding to the user network slice identity information of the user terminal UE is obtained from the network authentication entity; For example, in 5G), based on the introduction of network slicing...

Embodiment 2

[0094] Such as Figure 6 As shown, an embodiment of the present invention provides an authentication method for network slicing, wherein the method includes:

[0095] S601. Obtain attachment request information of the user terminal;

[0096] S602. Generate a network slice authentication vector corresponding to the user network slice identity information of the user terminal according to the attachment request information;

[0097] S603. Send the network slicing authentication vector to a network slicing functional entity, so that the network slicing functional entity authenticates with the user terminal according to the network slicing authentication vector.

[0098] The method in the embodiment of the present invention is used for network authentication entities, such as HSS.

[0099]The embodiment of the present invention obtains the attachment request information of the user terminal; generates a network slice authentication vector corresponding to the user network slice ...

Embodiment 3

[0134] Such as Figure 7 As shown, the embodiment of the present invention provides a network slicing function entity device, the device includes a first memory 70 and a first processor 72; the first memory 70 stores an authentication computer program for network slicing of the device The computer program is executed by the first processor 72 to realize the following steps:

[0135] Obtaining a network slice authentication vector corresponding to the user network slice identity information of the user terminal from the network authentication entity;

[0136] performing authentication with the user terminal according to the network slice authentication vector.

[0137] Optionally, the network slice authentication vector includes at least the following parameters: random number, expected response, network slice key and authentication token;

[0138] The authentication is the Authentication and Key Agreement Protocol (AKA) authentication of the mobile communication network;

...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a network slice authentication method, a corresponding device, a system and a medium, which are used for solving the authentication problem of UE accessing the network slice ina mobile communication network. The method comprises the following steps: acquiring a network slice authentication vector corresponding to the user network slice identification information of the user terminal from a network authentication entity; and authenticating with the user terminal according to the network slice authentication vector. A method for authenticate network slice in that invention and corresponding device, When the UE attaches to the mobile communication network and further accesses the network slice to receive the service provided based on the network slice, the system andthe medium effectively meet the dynamic deployment characteristics of the network slice, so that the attachment process meets the authentication requirements of the UE accessing the network slice.

Description

technical field [0001] The present invention relates to the field of mobile communication, in particular to an authentication method for network slicing and a corresponding device, system and medium. Background technique [0002] The 5G (fifth generation mobile communication technology) network architecture will introduce new IT technologies, such as Network Function Virtualization (NFV, Network Function Virtualization). In 3 / 4G networks, the protection of functional network elements largely depends on the security isolation of physical devices. In the 5G network, due to the deployment of NFV technology, some functional network elements are deployed on the cloud infrastructure in the form of virtual functional network elements. A virtual core network constructed based on network service requirements is called a network slice, and a network slice constitutes a virtual core network to provide mobile network access services for a group of specific user terminals (UEs). A typi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/04H04W12/06H04W12/0431H04W12/069
CPCH04W12/04H04W12/06
Inventor 余万涛
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products